​
Login / Signup
Ruoqing Zhang
ORCID
Publication Activity (10 Years)
Years Active: 2013-2024
Publications (10 Years): 8
Top Topics
Public Key
Access Control
Ciphertext
Authentication Protocol
Top Venues
CloudComp
TrustCom/BigDataSE
IEEE J. Biomed. Health Informatics
Secur. Commun. Networks
</>
Publications
</>
Ruoqing Zhang
,
Shanshan Feng
,
Nan Hu
,
Shunkang Low
,
Meng Li
,
Xiaogang Chen
,
Hongyan Cui
Hybrid Brain-Computer Interface Controlled Soft Robotic Glove for Stroke Rehabilitation.
IEEE J. Biomed. Health Informatics
28 (7) (2024)
Jing Wen
,
Lucas C. K. Hui
,
Siu-Ming Yiu
,
Ruoqing Zhang
DCN: Detector-Corrector Network Against Evasion Attacks on Deep Neural Networks.
DSN Workshops
(2018)
Zechao Liu
,
Zoe Lin Jiang
,
Xuan Wang
,
Siu-Ming Yiu
,
Ruoqing Zhang
,
Yulin Wu
A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage.
TrustCom/BigDataSE
(2018)
Ruoqing Zhang
,
Lucas Chi Kwong Hui
,
Siu-Ming Yiu
,
Xiaoqi Yu
,
Zechao Liu
,
Zoe Lin Jiang
A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation.
TrustCom/BigDataSE/ICESS
(2017)
Ruoqing Zhang
,
Chiling Chow
,
Lucas C. K. Hui
Crypt-EHRServer: Protecting Confidentiality with Attribute-Based Encryption and Encrypted Query Processing.
ISPAN-FCST-ISCC
(2017)
Jingxuan Wang
,
Lucas C. K. Hui
,
Siu-Ming Yiu
,
Gang Zhou
,
Ruoqing Zhang
F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems.
Secur. Commun. Networks
2017 (2017)
Zoe Lin Jiang
,
Ruoqing Zhang
,
Zechao Liu
,
Siu-Ming Yiu
,
Lucas C. K. Hui
,
Xuan Wang
,
Junbin Fang
A Revocable Outsourcing Attribute-Based Encryption Scheme.
CloudComp
(2016)
Xiaoqi Yu
,
Nairen Cao
,
Gongxian Zeng
,
Ruoqing Zhang
,
Siu-Ming Yiu
LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation).
WISA
(2016)
Zehui Li
,
Ruoqing Zhang
,
Yatao Yang
,
Zichen Li
A Provable Secure Mutual RFID Authentication Protocol Based on Error-Correct Code.
CyberC
(2014)
Zhiwei Chen
,
Ruoqing Zhang
,
Yatao Yang
,
Zichen Li
A Homomorphic ElGamal Variant Based on BGN's Method.
CyberC
(2013)